The banking trojan spreads through SMS phishing links that redirect users to a fake page prompting them to download an application. The victim then installs an APK outside the Play Store.
Once installed and granted permissions, Herodotus requests critical permissions (including Accessibility), overlays fake screens on top of legitimate applications to deceive the user, and can capture the screen and keystrokes. Its goal is session takeover, which is performing operations while the victim is actively logged in.
To bypass anti-fraud systems, Herodotus “humanizes” its actions with random delays, micro-movements, and realistic typing patterns to make automation much more difficult to detect
The Pradeo team searched for the malware in the database of a leading antivirus provider : no alert was raised on the application’s content. In other words, the antivirus failed to flag the malicious applicatio, even though it clearly appears as such when searched for using a simple search engine.
This can be explained by how antivirus solutions work, they rely mainly on known signatures and previously observed behaviors. A malicious application obtained through SMS phishing and installed outside the Play Store may easily go undetected if its code is new and its dangerous actions are only triggered after installation and permission approval.
Effective detection, in this case, depends on chaining multiple indicators of compromise : a suspicious SMS link leading to an unknown source, installation from outside the store, critical permission requests, followed by visible signs such as screen overlays, simulated interactions, or screen captures.
Individually, these signals may seem harmless, but together, and in their sequence, they clearly reveal an ongoing attack that an antivirus can easily miss.
Unlike an antivirus, a Mobile Threat Defense (MTD) solution observes the real behavior of the device and acts at every stage of the attack chain:
The Herodotus case clearly illustrates that antivirus solutions are not suited to modern mobile threats, which combine social engineering, off-store installations, and abuse of sensitive permissions.
To effectively protect collaborators and corporate data, deploying a Mobile Threat Defense (MTD) solution is now essential.